skip to main content
10.1145/2492517.2492654acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Circles, posts and privacy in egocentric social networks: an exploratory visualization approach

Published: 25 August 2013 Publication History

Abstract

The users in Online Social Networks (OSN) may share private information with wrong friends. One approach to tackle this issue is by applying community discovery methods in egocentric networks to automatically generate friend circles for the user. There is however a discrepancy between the predicted circles and the circles that the user has in mind. A deep rooted reason is that it only makes sense when the circles are considered under certain usage. We designed and implemented an exploratory visualization tool that can help users determine the visibilities of their online posts. More specifically, we first examined the state-of-the-art community discovery methods for egocentric networks, then proposed a new visualization design with fine-grained control for the user to interact with the circles and make visibility decisions. Finally, we conducted an experimental user study evaluating the usefulness of this design.

References

[1]
A. Acquisti, B. V. Alsenoy, E. Balsa, B. Berendt, D. Clarke, C. Diaz, B. Gao, S. Grses, A. Kuczerawy, J. Pierson, F. Piessens, R. Sayaf, T. Schellens, F. Stutzman, E. Vanderhoven, and R. D. Wolf, "D2.1- state of the art," Agentschap voor Innovatie door Wetenschap en Technologie IWT, Tech. Rep., Sep. 2011. {Online}. Available: https://www.cosic.esat.kuleuven.be/publications/article-2077.pdf
[2]
K. Raynes-Goldie, "Aliases, creeping, and wall cleaning: Understanding privacy in the age of facebook." First Monday, vol. 15, no. 1, 2010.
[3]
A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, "We're in it together: interpersonal management of disclosure in social network services," in Proceedings of the 2011 annual conference on Human factors in computing systems, ser. CHI '11. New York, NY, USA: ACM, May 2011, pp. 3217--3226.
[4]
R. D. Wolf, R. Heyman, and J. Pierson, "Privacy by Design through social requirements analysis of social network sites from a user perspective," in European Data Protection: Coming of Age, S. Gutwirth, R. Leenes, and P. de Hert, Eds. Berlin, Germany: Springer, 2012.
[5]
S. B. Barnes, "A privacy paradox: Social networking in the united states." First Monday, vol. 11, no. 9, 2006.
[6]
d. m. boyd and E. Hargittai, "Facebook privacy settings: Who cares?" First Monday, vol. 15, no. 8, Aug. 2010.
[7]
d. m. boyd, "Taken Out of Context: American Teen Sociality in Networked Publics," Social Science Research Network Working Paper Series, Feb. 2009.
[8]
A. E. Marwick and d. m. boyd, "I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience," New Media & Society, vol. 13, no. 1, pp. 114--133, Feb. 2011.
[9]
B. Gao, B. Berendt, D. Clarke, R. D. Wolf, T. Peetz, J. Pierson, and R. Sayaf, "Interactive grouping of friends in osn: Towards online context management." in ICDM Workshops. IEEE Computer Society, 2012, pp. 555--562.
[10]
M. Coscia, F. Giannotti, and D. Pedreschi, "A classification for community discovery methods in complex networks," CoRR, vol. abs/1206.3552, 2012.
[11]
M. E. Newman, "Detecting community structure in networks," The European Physical Journal B-Condensed Matter and Complex Systems, vol. 38, no. 2, pp. 321--330, 2004.
[12]
J. J. McAuley and J. Leskovec, "Learning to discover social circles in ego networks." in NIPS, 2012, pp. 548--556.
[13]
J. Munkres, "Algorithms for the assignment and transportation problems," Journal of the Society for Industrial & Applied Mathematics, vol. 5, no. 1, pp. 32--38, 1957.
[14]
M. E. Newman, "Modularity and community structure in networks," Proceedings of the National Academy of Sciences, vol. 103, no. 23, pp. 8577--8582, 2006.
[15]
T. Schaffter and D. Marbach, "Jmod user manual," EPFL, Laboratory of Intelligent Systems, Tech. Rep., 2012.
[16]
R. De Wolf and J. Pierson, "Researching social privacy on sns through developing and evaluating alternative privacy technologies," in Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 2012.
[17]
M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer, "Quantifying the invisible audience in social networks," in ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2013)., 2013.
[18]
J. C. Quiroz, S. J. Louis, A. Shankar, and S. M. Dascalu, "Interactive genetic algorithms for user interface design," in Evolutionary Computation, 2007. CEC 2007. IEEE Congress on. IEEE, 2007, pp. 1366--1373.
[19]
Y. Rogers, H. Sharp, and J. Preece, Interaction design: beyond human-computer interaction. Wiley, 2011.
[20]
S. Jones, "Automating group-based privacy control in social networks," Ph.D. dissertation, University of Bath, 2012.
[21]
C. M. Brown, Human-computer interface design guidelines. Intellect Books, 1998.
[22]
W. Lidwell, K. Holden, and J. Butler, Universal principles of design: 125 ways to enhance usability, influence perception, increase appeal, make better design decisions, and teach through design. Rockport Pub, 2010.
[23]
M. Kurosu and K. Kashimura, "Apparent usability vs. inherent usability: experimental analysis on the determinants of the apparent usability," in Conference companion on Human factors in computing systems. ACM, 1995, pp. 292--293.
[24]
K. Moore and J. C. McElroy, "The influence of personality on facebook usage, wall postings, and regret," Computers in Human Behavior, vol. 28, no. 1, pp. 267--274, 2012.
[25]
Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, "I regretted the minute i pressed share: A qualitative study of regrets on facebook," in Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM, 2011, p. 10.

Cited By

View all
  • (2020)Exploring Casual COVID-19 Data Visualizations on Twitter: Topics and ChallengesInformatics10.3390/informatics70300357:3(35)Online publication date: 15-Sep-2020
  • (2020)Privacy‐Preserving Data Visualization: Reflections on the State of the Art and Research OpportunitiesComputer Graphics Forum10.1111/cgf.1403239:3(675-692)Online publication date: 18-Jul-2020
  • (2019)Arcana: Enabling Private Posts on Public Microblog PlatformsICT Systems Security and Privacy Protection10.1007/978-3-030-22312-0_19(271-285)Online publication date: 5-Jun-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
August 2013
1558 pages
ISBN:9781450322409
DOI:10.1145/2492517
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. circles
  2. design
  3. online social networks
  4. privacy
  5. visualization

Qualifiers

  • Research-article

Funding Sources

Conference

ASONAM '13
Sponsor:
ASONAM '13: Advances in Social Networks Analysis and Mining 2013
August 25 - 28, 2013
Ontario, Niagara, Canada

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Exploring Casual COVID-19 Data Visualizations on Twitter: Topics and ChallengesInformatics10.3390/informatics70300357:3(35)Online publication date: 15-Sep-2020
  • (2020)Privacy‐Preserving Data Visualization: Reflections on the State of the Art and Research OpportunitiesComputer Graphics Forum10.1111/cgf.1403239:3(675-692)Online publication date: 18-Jul-2020
  • (2019)Arcana: Enabling Private Posts on Public Microblog PlatformsICT Systems Security and Privacy Protection10.1007/978-3-030-22312-0_19(271-285)Online publication date: 5-Jun-2019
  • (2018)Understanding Privacy Dichotomy in TwitterProceedings of the 29th on Hypertext and Social Media10.1145/3209542.3209564(156-164)Online publication date: 3-Jul-2018
  • (2018)Visual Methods and Tools for Social Network AnalysisEncyclopedia of Social Network Analysis and Mining10.1007/978-1-4939-7131-2_268(3298-3314)Online publication date: 12-Jun-2018
  • (2016)Privacy Behaviour and Profile Configuration in TwitterProceedings of the 25th International Conference Companion on World Wide Web10.1145/2872518.2890088(575-580)Online publication date: 11-Apr-2016
  • (2016)Visual Methods and Tools for Social Network AnalysisEncyclopedia of Social Network Analysis and Mining10.1007/978-1-4614-7163-9_268-1(1-17)Online publication date: 22-Dec-2016
  • (2015)Social computing and intelligenceProceedings of the 25th Annual International Conference on Computer Science and Software Engineering10.5555/2886444.2886486(252-255)Online publication date: 2-Nov-2015
  • (2015)Common Features against Similarity for Discovering Social Circles in NetworksProceedings of the 2015 Second European Network Intelligence Conference10.1109/ENIC.2015.21(91-97)Online publication date: 21-Sep-2015
  • (2015)The promise of audience transparency. Exploring users' perceptions and behaviors towards visualizations of networked audiences on FacebookTelematics and Informatics10.1016/j.tele.2015.04.00732:4(890-908)Online publication date: 1-Nov-2015
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media